收稿日期: 2016-08-06
修回日期: 2016-08-19
网络出版日期: 2016-09-30
基金资助
国家自然科学基金(No.U1536108,No.61572308,No.61525203,No.61472235)资助
Steganography by Constructing Texture Images
Received date: 2016-08-06
Revised date: 2016-08-19
Online published: 2016-09-30
提出一种通过构造纹理图像来隐藏信息的新型隐写方法。隐写者首先构建一个包含多种不同特征的单元库,用来表征二进制数据与图形单元之间的映射关系;根据秘密信息从单元库中选取图形,并确定图形在白纸上的摆放位置,绘制一幅含有隐写单元的图像;随后在其中添加背景元素,并通过可逆形变操作来生成一幅具有复杂纹理结构的含密图像。接收端在提取信息时,根据密钥对含密图像进行逆操作,去除背景图形后使用匹配滤波器识别源图像中的图形,通过分析其摆放位置和图形特征来提取秘密数据。实验结果表明,该方法生成的含密图像具有良好的视觉效果,使秘密数据得到了很好的隐蔽,而且通过调整参数还可以隐藏任意数量的秘密信息。
潘琳, 钱振兴, 张新鹏 . 基于构造纹理图像的数字隐写[J]. 应用科学学报, 2016 , 34(5) : 625 -632 . DOI: 10.3969/j.issn.0255-8297.2016.05.015
This paper proposes a new steganography method using texture construction. The data-hider first constructs a database of elements containing many different patterns and features used to represent secret bits. The data-hider selects patterns and features from the database according to the secret message. The selected elements are painted onto specified positions on a white paper, and some background elements added to the painted paper. With pre-defined transforming functions, the data-hider transforms the painted image to construct a stego-image. On the receiver side, secret messages can be extracted from the stego-image using the inverse operations. Experimental results show that the constructed stego-image has good visual effects, and the secret messages can be properly hidden into the image. Meanwhile, any amount of message can be hidden by choosing different parameters.
Key words: information hiding; texture synthesis; steganography
[1] Fridrich J. Steganography in digital media: principles, algorithms and applications [M]. Cambridge: Cambridge University Press, 2009.
[2] Wang H, Wang S. Cyber warfare: steganography vs. steganalysis [J]. Communication of ACM, 2004, 47(10): 76-82.
[3] Fridrich J, Goljan M. Practical steganalysis of digital images-state of the art [C]//Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE, 2002, 4675: 1-13.
[4] Fridrich J, Soukal D. Matrix embedding for large payloads [J]. IEEE Transactions Information Forensics and Security, 2006, 1(3): 390-395.
[5] Zhang X, Wang S. Dynamical running coding in digital steganography [J]. IEEE Signal Processing Letters, 2006, 13(3): 165-168.
[6] Zhang W, Zhang X, Wang S. Near-optimal codes for information embedding in gray-scale signals [J]. IEEE Transactions Information Theory, 2010, 56(3): 1262-1270.
[7] Fridrich J. Asymptotic behavior of the ZZW embedding construction [J]. IEEE Transactions Information Forensics and Security, 2009, 4(1): 151-154.
[8] Zhang W, Wang X. Generalization of the ZZW embedding construction for steganography [J]. IEEE Transactions Information Forensics and Security, 2009, 4(3): 564-569.
[9] Filler T, Judas J, Fridrich J. Minimizing embedding impact in steganography using trelliscoded quantization [C]//Electronic Imaging, Media Forensics, and Security XII, Proceedings of SPIE, 2010, 7541: 1-14.
[10] Pevny T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis[C]//Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, Proceedings of SPIE, 2007, 6505: 3-4.
[11] Shi Y Q, Chen C, Chen W. A Markov process based approach to effective attacking JPEG steganography [C]//Proceedings of the 8th International Workshop of Lecture Notes in Computer Science, LNCS, 2007, 4437: 249-264.
[12] Lyu S W, Farid H. Steganalysis using higher-order image statistics [J]. IEEE Transactions Information Forensics and Security, 2006, 1(1): 111-119.
[13] Bas P P, Fridrich J. Steganalysis by subtractive pixel adjacency matrix [J]. IEEE Transactions Information Forensics and Security, 2010, 5(2): 215-224.
[14] Fridrich J, Kodovsky J. Rich models for steganalysis of digital images [J]. IEEE Transactions Information Forensics and Security, 2012, 7(3): 868-882.
[15] Otori H, Kuriyama S. Data-embeddable texture synthesis [C]//Proceedings of the 8th International Symposium on Smart Graphics, Kyoto, Japan, 2007: 146-157.
[16] Otori H, Kuriyama S. Texture synthesis for mobile data communications [J]. IEEE Conference Graphics Applications, 2009, 29(6): 74-81.
[17] Wu K C, Wang C M. Steganography using reversible texture synthesis [J]. IEEE Transactions Image Proceedings, 2015, 24(1): 130-139.
[18] Xu J, Mao X, Jin X. Hidden message in a deformation-based texture [J]. Visual Computer, 2015, 31: 1653-1669.
/
| 〈 |
|
〉 |